This could be big - although just how big remains unclear. "There you have. 1,000,001 Apple Devices UDIDs linking to their users and their APNS tokens. The original file contained around 12,000,000 devices. We decided a million would be enough to release. We trimmed out other personal data as, full names, cell numbers, addresses, zipcodes, etc." How did AntiSec get this data (they claim)? From an FBI laptop. Why an FBI laptop would have a file with personal information on 12 million iOS users, we don't know - especially since 10000 of them are Dutch/Belgian, and last I checked, those do not fall under FBI jurisdiction. Did the FBI obtain it from an application developer, or from Apple itself? Then again - 12 million users? From a single iOS developer? I find that hard to believe.

The way I understand it, FBI agents in the field are required to use a DoD-provided Linux-based liveCD whenever they connect to the public Internet. It allows for a secure VPN tunnel back to government datacenters. Even my lowly terminal at work goes through two separate encrypted VPNs and it's just a county law enforcement terminal.

As to whether they actually do it in practice, who knows? Some of my coworkers completely ignore their Security and Integrity training and use their mobile data terminals to look up license plate info on cute women. Those sorts of shenanigans go all the way to the top of the ladder too.